Skip to content

Commit 2a9ba26

Browse files
authored
Merge branch 'main' into docs-editor/fixed-reported-inaccuracies-1742387410
2 parents 0a90a5d + eca4bca commit 2a9ba26

File tree

151 files changed

+696
-427
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

151 files changed

+696
-427
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,8 @@
8282
},
8383
{
8484
"source_path": "defender-endpoint/linux-support-rhel.md",
85-
"redirect_url": "/defender-endpoint/comprehensive-guidance-on-linux-deployment",
86-
"redirect_document_id": true
85+
"redirect_url": "/defender-endpoint/linux-installer-script",
86+
"redirect_document_id": false
8787
},
8888
{
8989
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
@@ -105,10 +105,20 @@
105105
"redirect_url": "/defender-endpoint/overview-client-analyzer",
106106
"redirect_document_id": false
107107
},
108+
{
109+
"source_path": "defender-endpoint/schedule-antivirus-scan-in-mde.md",
110+
"redirect_url": "/defender-endpoint/schedule-antivirus-scan-anacron",
111+
"redirect_document_id": true
112+
},
108113
{
109114
"source_path": "defender-endpoint/comprehensive-guidance-on-linux-deployment.md",
110115
"redirect_url": "/defender-endpoint/linux-installer-script",
111116
"redirect_document_id": true
112-
}
117+
},
118+
{
119+
"source_path": "defender-endpoint/linux-schedule-scan-mde.md",
120+
"redirect_url": "/defender-endpoint/schedule-antivirus-scan-crontab",
121+
"redirect_document_id": true
122+
}
113123
]
114124
}

ATPDocs/remove-rbcd-microsoft-entra-seamless-single-sign-on-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: 'Security assessment: Remove Resource Based Constrained Delegation for Microsoft Entra seamless SSO account'
33
description: This article describes Microsoft Defender for Identity's Microsoft Entra Seamless Single sign-on (SSO) account with Resource Based Constrained Delegation (RBCD) applied security posture assessment report.
44
author: RonitLitinsky
5-
ms.author: t-rlitinsky
5+
ms.author: rlitinsky
66
ms.service: microsoft-defender-for-identity
77
ms.topic: article
88
ms.date: 08/22/2024

CloudAppSecurityDocs/activity-filters-queries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Below is a list of the activity filters that can be applied. Most filters suppor
3535
- Administrative activity – Search only for administrative activities.
3636

3737
>[!NOTE]
38-
> Defender for Cloud Apps can't mark Google Cloud Platform (GCP) administrative activities as administrative activities.
38+
> Defender for Cloud Apps classifies all GCP activities as administrative activities.
3939
4040
- Alert ID - Search by alert ID.
4141

CloudAppSecurityDocs/cas-compliance-trust.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Defender for Cloud Apps operates in the Microsoft Azure data centers in the foll
2929
|---------|---------|
3030
|**Customers whose tenants are provisioned in the United States** | United States |
3131
|**Customers whose tenants are provisioned in the European Union or the United Kingdom** | Either the European Union and/or the United Kingdom |
32-
|**Customers whose tenants are provisioned in any other region** | The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned |
32+
|**Customers whose tenants are provisioned in any other region** | The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned. |
3333

3434
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions listed below. Customer with App Governance enabled will have data stored within the data storage location the customer provisions in above, and in a second data storage location as described below:
3535

@@ -45,7 +45,7 @@ In addition to the locations above, the App Governance features within Defender
4545
| **Customers whose tenants are provisioned in Japan** | Japan |
4646
| **Customers whose tenants are provisioned in India** | India |
4747
| **Customers whose tenants are provisioned in Asia Pacific** | Asia Pacific |
48-
|**Customers whose tenants are provisioned in any other region** | The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned |
48+
|**Customers whose tenants are provisioned in any other region** | The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned. |
4949

5050
Customer data collected by Defender for Cloud Apps is either stored in your tenant location, as described in the previous tables, or in the geographic location of another online service that Defender for Cloud Apps shares data with, as defined by the data storage rules of that online service.
5151

@@ -71,4 +71,4 @@ Defender for Cloud Apps shares data, including customer data, among the followin
7171

7272
## Related content
7373

74-
For more information, see the [Microsoft Service Trust portal](https://www.microsoft.com/en-us/trust-center/product-overview).
74+
For more information, see the [Microsoft compliance offerings](/compliance/regulatory/offering-nist-sp-800-171).

CloudAppSecurityDocs/discovery-kubernetes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ This article describes how to configure automatic log upload for continuous repo
3838
1. Run the helm command using the following syntax:
3939
4040
```AzureCLI
41-
helm install <release-name> oci://agentspublic.azurecr.io/logcollector-chart --version 1.0.0 --set inputString="<generated id> ",env.PUBLICIP="<public ip>",env.SYSLOG="true",env.COLLECTOR="<collector-name>",env.CONSOLE="<Console-id>",env.INCLUDE_TLS="on" --set-file ca=<absolute path of ca.pem file> --set-file serverkey=<absolute path of server-key.pem file> --set-file servercert=<absolute path of server-cert.pem file> --set replicas=<no of replicas> --set image.tag=0.272.0
41+
helm install <release-name> oci://mcr.microsoft.com/mcas/helmchart/logcollector-chart --version 1.0.5 --set inputString="<generated id> ",env.PUBLICIP="<public ip>",env.SYSLOG="true",env.COLLECTOR="<collector-name>",env.CONSOLE="<Console-id>",env.INCLUDE_TLS="on" --set-file ca=<absolute path of ca.pem file> --set-file serverkey=<absolute path of server-key.pem file> --set-file servercert=<absolute path of server-cert.pem file> --set replicas=<no of replicas> -n <namespace>
4242
```
4343
4444
Find the values for the helm command using the docker command used when the collector is configured. For example:

CloudAppSecurityDocs/protect-office-365.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,8 @@ Defender for Cloud Apps integrates directly with [Microsoft 365's audit logs](/m
9696
- Events from **Exchange**, **Power BI**, and **Teams** will only appear after activities from those services are detected in the portal.
9797

9898

99-
- [Multi-geo deployments](/microsoft-365/enterprise/microsoft-365-multi-geo) are only supported for OneDrive
99+
- [Multi-geo deployments](/microsoft-365/enterprise/microsoft-365-multi-geo) are only supported for OneDrive.
100+
- Events from **Exchange** reflect the actor, which is either the application or the user, that performed the action.
100101

101102
### Microsoft Entra integration
102103

@@ -153,12 +154,12 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
153154
1. After Microsoft 365 is displayed as successfully connected, select **Done**.
154155
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
155156

156-
SaaS Security Posture Management (SSPM) data is shown in the Microsoft Defender Portal on the **Secure Score** page. For more information, see [Security posture management for SaaS apps](/defender-cloud-apps/security-saas).
157+
SaaS Security Posture Management (SSPM) data is shown in the Microsoft Defender Portal on the **Secure Score** page. For more information, see [Security posture management for SaaS apps](/defender-cloud-apps/security-saas).
157158

158-
> [!NOTE]
159-
> After connecting Microsoft 365, you will see data from a week back including any third-party applications connected to Microsoft 365 that are pulling APIs. For third-party apps that weren't pulling APIs prior to connection, you see events from the moment you connect Microsoft 365 because Defender for Cloud Apps turns on any APIs that had been off by default.
159+
> [!NOTE]
160+
> After connecting Microsoft 365, you will see data from a week back including any third-party applications connected to Microsoft 365 that are pulling APIs. For third-party apps that weren't pulling APIs prior to connection, you see events from the moment you connect Microsoft 365 because Defender for Cloud Apps turns on any APIs that had been off by default.
160161
161-
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
162+
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
162163

163164
## Next steps
164165

CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: Troubleshoot App Connector error messages
2+
title: Troubleshoot App Connector errors
33
description: This article provides a list of API App connector error messages as well as resolution recommendations for each.
44
ms.date: 01/29/2023
55
ms.topic: conceptual
66
---
7-
# Troubleshooting App Connector error messages
7+
# Troubleshooting App Connector errors
88

99

1010

@@ -14,6 +14,9 @@ This article provides a list of API App connector error messages and resolution
1414

1515
App connector errors can be seen in the app connector dialog after attempting to connect a cloud app using the API App connector.
1616

17+
> [!NOTE]
18+
> If a connector experiences a failure or disconnection, a system alert will be generated. To resume normal operations and maintain connectivity, reconnect the connector on the connectors page.
19+
1720
> [!div class="mx-tableFixed"]
1821
>
1922
> |Error message|Relevant app|Description|Resolution|

defender-business/mdb-faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.topic: faq
1111
ms.service: defender-business
1212
ms.localizationpriority: medium
13-
ms.date: 01/02/2024
13+
ms.date: 03/19/2024
1414
ms.reviewer: efratka, nehabha
1515
f1.keywords: NOCSH
1616
ms.collection:
@@ -157,7 +157,7 @@ sections:
157157
| Cross-platform support <br/>(Mac, iOS, Android)| ✔ | ✔ | ✔ |
158158
| Windows Server and Linux Server <br/>(requires server licenses) | ✔ | ✔ | ✔ |
159159
| Microsoft Threat Experts | | | ✔ |
160-
| Microsoft 365 Lighthouse <br/>(optimized; for CSPs only) | ✔ | | |
160+
| Microsoft 365 Lighthouse <br/>(optimized; for CSPs only) | ✔ | ✔ | ✔ |
161161
| Microsoft Defender multi-tenant management | ✔ | ✔ | ✔ |
162162
| APIs | ✔ | ✔ | ✔ |
163163

defender-endpoint/TOC.yml

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -294,9 +294,11 @@
294294
- name: Configure antivirus scans
295295
items:
296296
- name: Schedule antivirus scans using Anacron
297-
href: schedule-antivirus-scan-in-mde.md
297+
href: schedule-antivirus-scan-anacron.md
298298
- name: Schedule antivirus scans using Crontab
299-
href: linux-schedule-scan-mde.md
299+
href: schedule-antivirus-scan-crontab.md
300+
- name: Network protection for Linux
301+
href: network-protection-linux.md
300302
- name: Configure and validate exclusions on Linux
301303
href: linux-exclusions.md
302304
- name: Configure eBPF-based sensor
@@ -329,8 +331,9 @@
329331
href: ios-install-unmanaged.md
330332
- name: Configure Mobile Threat Defense
331333
items:
332-
- name: New user experiences in Defender for Endpoint on iOS
333-
href: ios-new-ux.md
334+
- name: User experiences in Defender for Endpoint on Android
335+
href: android-new-ux.md
336+
- name: User experiences in Defender for Endpoint on iOS
334337
- name: Mobile device resources for Defender for Endpoint
335338
href: mobile-resources-defender-endpoint.md
336339
- name: Configure Defender for Endpoint on Android features
@@ -700,8 +703,6 @@
700703
href: evaluate-network-protection.md
701704
- name: Turn on network protection
702705
href: enable-network-protection.md
703-
- name: Network protection for Linux
704-
href: network-protection-linux.md
705706
- name: Network protection for MacOS
706707
href: network-protection-macos.md
707708
- name: Web protection

defender-endpoint/access-mssp-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Access the Microsoft Defender XDR MSSP customer portal
33
description: Access the Microsoft Defender XDR MSSP customer portal
44
ms.service: defender-endpoint
55
ms.subservice: onboard
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: ewalsh
7+
author: emmwalshh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -13,7 +13,7 @@ ms.collection:
1313
- tier3
1414
ms.topic: conceptual
1515
search.appverid: met150
16-
ms.date: 12/18/2020
16+
ms.date: 03/21/2025
1717
---
1818

1919
# Access the Microsoft Defender XDR MSSP customer portal
@@ -26,7 +26,7 @@ ms.date: 12/18/2020
2626

2727
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2828

29-
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
29+
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3030
3131
> [!IMPORTANT]
3232
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

0 commit comments

Comments
 (0)